Versions in this module Expand all Collapse all v0 v0.2.2 Nov 18, 2022 Changes in this version + const FlgNeg128 + const FlgNeg56 + const FlgNegAlwaysSign + const FlgNegAnonymous + const FlgNegDatagram + const FlgNegExtendedSessionSecurity + const FlgNegIdentify + const FlgNegKeyExch + const FlgNegLmKey + const FlgNegNTLM + const FlgNegOEM + const FlgNegOEMDomainSupplied + const FlgNegOEMWorkstationSupplied + const FlgNegRequestNonNtSessionKey + const FlgNegRequestTarget + const FlgNegReserved1 + const FlgNegReserved10 + const FlgNegReserved2 + const FlgNegReserved3 + const FlgNegReserved4 + const FlgNegReserved5 + const FlgNegReserved6 + const FlgNegReserved7 + const FlgNegReserved8 + const FlgNegReserved9 + const FlgNegSeal + const FlgNegSign + const FlgNegTargetInfo + const FlgNegTargetTypeDomain + const FlgNegTargetTypeServer + const FlgNegUnicode + const FlgNegVersion + const MsvAvDnsComputerName + const MsvAvDnsDomainName + const MsvAvDnsTreeName + const MsvAvEOL + const MsvAvFlags + const MsvAvNbComputerName + const MsvAvNbDomainName + const MsvAvSingleHost + const MsvAvTargetName + const MsvAvTimestamp + const MsvChannelBindings + const NTLMAuthenticate + const NTLMChallenge + const NTLMNegotiate + const NTLMSSPMECHTYPEOID + const NTLMSecSignature + func ComputeNTLMv2Response(h hash.Hash, clientChallenge, serverChallenge, timestamp, serverName []byte) (NTChallengeResponse, LMChallengeResponse, SessionBaseKey []byte) + func LMOWFv2(password, user, userDomain string) []byte + func NTOWFv1(pass string) []byte + func NTOWFv2(password, user, userDomain string) []byte + func NTOWFv2Hash(hash, user, userDomain string) []byte + type AvPair struct + AvID uint16 + AvLen uint16 + Value []byte + func (p AvPair) Size() uint64 + type AvPairSlice []AvPair + func (s *AvPairSlice) MarshalBinary(meta *encoder.Metadata) ([]byte, error) + func (s *AvPairSlice) UnmarshalBinary(buf []byte, meta *encoder.Metadata) error + type Challenge struct + NegotiateFlags uint32 + Reserved uint64 + ServerChallenge uint64 + TargetInfo *AvPairSlice + TargetInfoBufferOffset uint32 + TargetInfoLen uint16 + TargetInfoMaxLen uint16 + TargetName []byte + TargetNameBufferOffset uint32 + TargetNameLen uint16 + TargetNameMaxLen uint16 + Version uint64 + func NewChallenge() Challenge + type Header struct + MessageType uint32 + Signature []byte + type NTLMv2Authentication struct + DomainName []byte + DomainNameBufferOffset uint32 + DomainNameLen uint16 + DomainNameMaxLen uint16 + EncryptedRandomSessionKey []byte + EncryptedRandomSessionKeyBufferOffset uint32 + EncryptedRandomSessionKeyLen uint16 + EncryptedRandomSessionKeyMaxLen uint16 + LmChallengeResponse []byte + LmChallengeResponseBufferOffset uint32 + LmChallengeResponseLen uint16 + LmChallengeResponseMaxLen uint16 + MIC []byte + NegotiateFlags uint32 + NtChallengResponseBufferOffset uint32 + NtChallengeResponse []byte + NtChallengeResponseLen uint16 + NtChallengeResponseMaxLen uint16 + UserName []byte + UserNameBufferOffset uint32 + UserNameLen uint16 + UserNameMaxLen uint16 + Workstation []byte + WorkstationBufferOffset uint32 + WorkstationLen uint16 + WorkstationMaxLen uint16 + func NewAuthenticateHash(domain, user, workstation, hash string, c Challenge) NTLMv2Authentication + func NewAuthenticatePass(domain, user, workstation, password string, c Challenge) NTLMv2Authentication + type Negotiate struct + DomainName []byte + DomainNameBufferOffset uint32 + DomainNameLen uint16 + DomainNameMaxLen uint16 + NegotiateFlags uint32 + Workstation []byte + WorkstationBufferOffset uint32 + WorkstationLen uint16 + WorkstationMaxLen uint16 + func NewNegotiate(domainName, workstation string) Negotiate